Appendix J: Glossary Of Terms - Thales Datacryptor Ethernet User Manual

Table of Contents

Advertisement

Appendix J: Glossary of Terms

Appendix J: Glossary of Terms
Advanced Encryption
Standard (AES)
Bits per Sec (bps)
Block cipher
Certificate
Certification Authority
(CA)
Cipher block chaining
(CBC)
Ciphertext
Ciphertext Stealing
(CTS)
Command Line Interface
(CLI)
Diffie-Hellman
Digital Signature
Digital Signature
Standard (DSS)
DSA
DSA public parameters
Page 132
All manuals and user guides at all-guides.com
A symmetric algorithm (same key for encryption and decryption)
using block encryption of 128 bits in size, supporting key sizes of
128, 192 and 256 bits.
The number of bits passing a point every second; the transmission
rate for digital information.
A type of symmetric (secret-key) encryption algorithm that encrypts
a fixed length block of plaintext at a time. With a block cipher, the
same plaintext block always encrypts to the same ciphertext block,
under the same key.
A digital document which helps to prevent someone impersonating
someone else. Each certificate contains a certified public key and
other information such as issuer's name and algorithms used in
encryption and decryption.
A certificate authority is a trusted organization that accepts
certificate applications, authenticates applications, issues
certificates, and maintains status information about certificates.
A method of using a block cipher in which two identical plaintext
blocks encrypt to different ciphertexts.
An unintelligible form of data that can only be read if specific
operations are performed on it using a key and decrypting
algorithm.
CTS mode is a Datacryptor mode of operation that minimizes the
latency caused by the encryption of the Ethernet packets passing
through the Datacryptor unit.
The CLI is the text-based user interface to the Datacryptor.
A protocol which allows two users to agree a secret key over an
insecure medium without any prior secret keys.
A digital signature must be difficult to repudiate, and must protect
the integrity of the information being signed. By encrypting a
digest of a message with the private key, authentication can later
be performed by applying the public key to an encrypted digest
(digital signature) and comparing the result to the digest of the
message.
A standard for digital signatures using the DSA public key
algorithm and the SHA-1 hash algorithm.
An abbreviation for Digital Signature Algorithm. It is an algorithm
used for authentication only.
Parameters used to generate and check DSA digital signatures.
Datacryptor Ethernet User Manual
THALES

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Datacryptor Ethernet and is the answer not in the manual?

Questions and answers

Table of Contents

Save PDF